Skip to content
View pr0b3r7's full-sized avatar

Highlights

  • Pro

Organizations

@humanaoffsec @HackerHermanos

Block or report pr0b3r7

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

ATLAS Adversarial ML

AI/ML Security: MITRE ATLAS (atlas.mitre.org) + OWASP LLM Top 10 + Google SAIF. Covers prompt injection, model tampering, data poisoning, agent security, privac
28 repositories

TA0001 Initial Access

Initial Access (TA0001): Gaining initial foothold in target networks. Includes phishing, exploiting public-facing apps, supply chain compromise, valid accounts. https://attack.mitre.org/tactics/TA0001
60 repositories

TA0002 Execution

Execution (TA0002): Running malicious code on target systems. Includes command interpreters, scripting, native APIs, exploitation for client execution. https://attack.mitre.org/tactics/TA0002
319 repositories

TA0003 Persistence

Persistence (TA0003): Maintaining access across restarts and credential changes. Includes registry run keys, scheduled tasks, bootkit, implants, account manipulation. https://attack.mitre.org/tactics/TA0003
34 repositories

TA0004 Privilege Escalation

Privilege Escalation (TA0004): Gaining higher-level permissions. Includes exploitation, access token manipulation, UAC bypass, AD escalation, sudo/setuid abuse. https://attack.mitre.org/tactics/TA0004
92 repositories

TA0005 Defense Evasion

Defense Evasion (TA0005): Avoiding detection. Includes obfuscation, disabling security tools, process injection, masquerading, AMSI/ETW bypass, rootkits. https://attack.mitre.org/tactics/TA0005
325 repositories

TA0006 Credential Access

Credential Access (TA0006): Stealing credentials. Includes password dumping, Kerberoasting, credential harvesting, brute force, keylogging, LSASS access. https://attack.mitre.org/tactics/TA0006
135 repositories

TA0007 Discovery

Discovery (TA0007): Understanding target environment. Includes network enumeration, AD recon, system info gathering, account discovery, BloodHound. https://attack.mitre.org/tactics/TA0007
151 repositories

TA0008 Lateral Movement

Lateral Movement (TA0008): Moving through the network. Includes pass-the-hash, RDP, SMB/WMI exec, SSH tunneling, pivoting, proxychains. https://attack.mitre.org/tactics/TA0008
78 repositories

TA0009 Collection

Collection (TA0009): Gathering target data. Includes screen capture, keylogging, email harvesting, clipboard data, memory dumping, secret scanning. https://attack.mitre.org/tactics/TA0009
21 repositories

TA0010 Exfiltration

Exfiltration (TA0010): Stealing data from target. Includes covert channels, DNS tunneling, steganography, encrypted transfers, cloud storage abuse. https://attack.mitre.org/tactics/TA0010
10 repositories

TA0011 Command and Control (C2)

Command and Control (TA0011): Communicating with compromised systems. Includes C2 frameworks (Cobalt Strike, Sliver), domain fronting, protocol tunneling. https://attack.mitre.org/tactics/TA0011
247 repositories

TA0040 Impact

Impact (TA0040): Disrupting availability or integrity. Includes ransomware, data destruction, defacement, resource hijacking, service disruption. https://attack.mitre.org/tactics/TA0040
6 repositories

TA0042 Resource Development

Resource Development (TA0042): Building attack infrastructure. Includes payload development, infrastructure setup, capability acquisition, tool compilation. https://attack.mitre.org/tactics/TA0042
419 repositories

TA0043 Reconnaissance

Reconnaissance (TA0043): Gathering target information. Includes OSINT, subdomain enumeration, network scanning, social engineering research. https://attack.mitre.org/tactics/TA0043
168 repositories

Threat Hunting

Threat Hunting related repositories
123 repositories

Starred repositories

20 stars written in Jupyter Notebook
Clear filter

A collection of notebooks/recipes showcasing some fun and effective ways of using Claude.

Jupyter Notebook 37,816 4,202 Updated Apr 9, 2026

This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), AI security,…

Jupyter Notebook 25,907 4,938 Updated Apr 5, 2026

Official code repo for the O'Reilly Book - "Hands-On Large Language Models"

Jupyter Notebook 24,937 5,784 Updated Dec 17, 2025

Anthropic's educational courses

Jupyter Notebook 20,377 2,067 Updated Nov 13, 2025

AirLLM 70B inference with single 4GB GPU

Jupyter Notebook 15,165 1,549 Updated Mar 10, 2026

A multi-voice TTS system trained with an emphasis on quality

Jupyter Notebook 14,832 2,049 Updated Nov 19, 2024

[WIP] Resources for AI engineers. Also contains supporting materials for the book AI Engineering (Chip Huyen, 2025)

Jupyter Notebook 14,646 2,116 Updated Feb 12, 2025

The Jupyter Notebooks behind my OReilly report, "A Whirlwind Tour of Python"

Jupyter Notebook 3,993 1,710 Updated Jan 31, 2024

The Hunting ELK

Jupyter Notebook 3,914 693 Updated Jun 1, 2024

Learn to build your Second Brain AI assistant with LLMs, agents, RAG, fine-tuning, LLMOps and AI systems techniques.

Jupyter Notebook 2,633 469 Updated Apr 6, 2026

Course materials and handouts for #100DaysOfCode in Python course

Jupyter Notebook 2,189 1,069 Updated Dec 18, 2024

🐧 Abuse of Google Colab for cracking hashes.

Jupyter Notebook 969 142 Updated Jul 17, 2023

🏴‍☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷

Jupyter Notebook 219 28 Updated Sep 4, 2025

PowerShell Obfuscation and Data Science

Jupyter Notebook 183 29 Updated May 4, 2022

Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)

Jupyter Notebook 73 17 Updated Mar 22, 2019

ncclient scripts and helpers

Jupyter Notebook 68 28 Updated Feb 11, 2026

Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC

Jupyter Notebook 62 8 Updated Jan 10, 2022

Solutions developed by the MDEASM Customer Experience Engineering (CxE) Go-To Production (GTP) team for Azure MDEASM

Jupyter Notebook 29 14 Updated Feb 3, 2025

Source for my github pages blog

Jupyter Notebook 6 4 Updated Oct 26, 2018

Sample queries for Advanced hunting in Microsoft 365 Defender

Jupyter Notebook 1 1 Updated Dec 16, 2020